Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Detection of Intrusions and Ma...
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Save to List
Permanent link
Detection of Intrusions and Malware, and Vulnerability Assessment 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010, Proceedings / edited by Christian Kreibich, Marko Jahnke.
Saved in:
Bibliographic Details
Corporate Author:
SpringerLink (Online service)
Other Authors:
Kreibich, Christian
(Editor)
,
Jahnke, Marko
(Editor)
Format:
eBook
Language:
English
Published:
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
Edition:
1st ed. 2010.
Series:
Security and Cryptology ;
6201
Springer eBook Collection.
Subjects:
Computer communication systems.
Data encryption (Computer science).
Management information systems.
Computer science.
Computers and civilization.
Application software.
Algorithms.
Electronic resources (E-books)
Online Access:
Click to view e-book
Holy Cross Note:
Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Holdings
Description
Table of Contents
Similar Items
Staff View
Table of Contents:
Host Security
HookScout: Proactive Binary-Centric Hook Detection
Conqueror: Tamper-Proof Code Execution on Legacy Systems
dAnubis – Dynamic Device Driver Analysis Based on Virtual Machine Introspection
Trends
Evaluating Bluetooth as a Medium for Botnet Command and Control
Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype
Covertly Probing Underground Economy Marketplaces
Vulnerabilities
Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Organizing Large Scale Hacking Competitions
Intrusion Detection
An Online Adaptive Approach to Alert Correlation
KIDS – Keyed Intrusion Detection System
Web Security
Modeling and Containment of Search Worms Targeting Web Applications
HProxy: Client-Side Detection of SSL Stripping Attacks.
Similar Items
Detection of Intrusions and Malware, and Vulnerability Assessment 8th International Conference, DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011, Proceedings
Published: (2011)
Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings
Published: (2005)
Detection of Intrusions and Malware, and Vulnerability Assessment Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings
Published: (2006)
Detection of Intrusions and Malware, and Vulnerability Assessment 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings
Published: (2017)
Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings
Published: (2009)